e:\111123_144728_build_FREEzeFrog_FREEzeFrog_3.0.20.0\source\source_sa\bin\Release\ClientSAHook.pdb
Static task
static1
Behavioral task
behavioral1
Sample
14ab1155aa1c26f7158a68b2ade9a40f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14ab1155aa1c26f7158a68b2ade9a40f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
14ab1155aa1c26f7158a68b2ade9a40f_JaffaCakes118
-
Size
146KB
-
MD5
14ab1155aa1c26f7158a68b2ade9a40f
-
SHA1
eebef7c145b133de6e072274502d329438941ab0
-
SHA256
ea73caa6e5c4faea4cd762d1248cf6eeaaf53093b61d8f3a5e78f4aadcd8343e
-
SHA512
672a4051460391e0586404345810929fee828de2a8752450a7092b44c3e999ac66dabac59d0c6660f75eef73a57b274e0a8fb10cbd497eb64a705c7dc4837731
-
SSDEEP
3072:QdaI7BiGqE7hJ3MFPTF+Q0MTwsQO/a9IlH8htRzP9SK7K:MagBiGP7hVMtFAMUsDePA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14ab1155aa1c26f7158a68b2ade9a40f_JaffaCakes118
Files
-
14ab1155aa1c26f7158a68b2ade9a40f_JaffaCakes118.dll windows:5 windows x86 arch:x86
9e50d8a875498cb9d27b6ba2dcb86947
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
GetModuleFileNameA
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
IsBadStringPtrA
GetTickCount
GetCurrentThreadId
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcpyA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetFileAttributesW
GetVersion
FreeLibrary
LoadLibraryW
SetLastError
GetModuleFileNameW
OutputDebugStringA
LoadLibraryA
GetSystemTime
GetConsoleMode
GetConsoleCP
SetFilePointer
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
GetFileType
SetHandleCount
Sleep
RtlUnwind
SetStdHandle
GetLastError
IsProcessorFeaturePresent
HeapCreate
GetStdHandle
WriteFile
LCMapStringW
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
EncodePointer
DecodePointer
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
InitializeCriticalSectionAndSpinCount
WriteConsoleW
CreateFileW
OpenProcess
CloseHandle
WideCharToMultiByte
IsBadReadPtr
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
RaiseException
ExitProcess
GetCurrentProcessId
GetStringTypeW
FlushFileBuffers
user32
PtInRect
LoadCursorA
SetRectEmpty
GetClassLongA
SetClassLongA
GetDC
ReleaseDC
GetSysColorBrush
FillRect
GetSysColor
DrawTextA
CopyRect
SendMessageA
GetForegroundWindow
DestroyWindow
CreateWindowExA
GetClassInfoExA
RegisterClassExA
ScreenToClient
DefWindowProcA
EqualRect
SetRect
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
EnumWindows
FindWindowA
SystemParametersInfoA
CallNextHookEx
ShowWindow
GetCursorPos
WindowFromPoint
SetForegroundWindow
SetPropA
RemovePropA
PostMessageA
SetTimer
KillTimer
SetWindowsHookExA
UnhookWindowsHookEx
GetWindow
GetWindowThreadProcessId
GetParent
GetWindowLongA
EnumChildWindows
GetWindowTextA
GetClassNameA
IsWindowEnabled
FindWindowExA
SendMessageTimeoutA
GetPropA
GetAncestor
IsWindow
IsWindowVisible
GetWindowRect
GetSystemMetrics
GetClientRect
gdi32
CreateCompatibleBitmap
SelectObject
SetTextColor
SetBkMode
GetTextExtentPoint32A
BitBlt
DeleteDC
CreateFontIndirectA
GetStockObject
DeleteObject
CreateCompatibleDC
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ole32
CoDisconnectObject
CoCreateInstance
oleaut32
VariantClear
VariantCopy
VariantInit
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocString
psapi
EnumProcessModules
GetModuleFileNameExA
Exports
Exports
GetNCMYBFileVersion
GetNCMYBFileVersionMajor
GetNCMYBFileVersionMinor
HookUp
HookUp2
Unhook
Sections
.text Size: 91KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SHARDAT Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ